• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011

Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011



Final version of Lavacon11 Lightning Talk presentation

Final version of Lavacon11 Lightning Talk presentation



Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011 Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011 Presentation Transcript

    • Ten Tips to Shockproof Your Use of Social Media Ben Woelk Policy and Awareness Analyst Rochester Institute of Technology ben.woelk@gmail.com @benwoelk
    • Introduction • Everyone is a target • Organized crime funds the attacks 2
    • Avert Labs Malware Research 3Retrieved July 24, 2009 from:http://www.avertlabs.com/research/blog/index.php/2009/07/22/malware-is-their-businessand-business-is-good/
    • Tip # 1 Strong Passwords/Passphrases • Length more important than complexity It was a dark and stormy night becomes ItwasaDark215andStormyNight 4
    • Password Safes 5
    • Tip # 2 Keep up to date! • Operating Systems • Applications 6
    • Tip #3 Use Security Software Layers of Security • Anti-Virus Protection • Firewall • Anti-Spyware Protection Don’t overlook mobile devices! 7
    • Tip #4 Recognize Phishing/Scams 8
    • Phishing Tips 9
    • Tip #5 Use Social Networks SafelyDon’t:• Post personal information• Post schedules or whereabouts• Post inappropriate photoshttp://www.sileo.com/facebook-status-update-leads-to-robbery/ 10
    • Phishing on Social Network Sites 11 http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf
    • Tip #6 Remember Who Else is There • Who else uses social networking? – Employers – Identity Thieves – Online Predators • Facebook Stalker (http://www.youtube.com/watch?v=wCh9bmg0zGg) 12
    • What You Post Can Be Used To… • Make judgments about your character • Impersonate you to financial institutions • Monitor what you do and where you go 13
    • Tip #7 Be wary of others Is this really your friend? • Just because it’s your friend’s account does not mean that it’s your friend! 14
    • Tip #8 Search for your name • Do a vanity search • Set up a Google Alert 15
    • Tip #9 Guard Your PersonalInformation! • Watch out for Facebook Applications!! – A 2008 study found that 90.7% of apps had access to private user data (only 9.3% actually used the data) 16
    • Tip #10: Don’t Assume Privacy • Do you care if Facebook captures where you’ve been? 17
    • Use Privacy Settings • Default settings are set to sharing information • Adjust Facebook privacy settings to help protect your identity • Show "limited friends" a cut-down version of your profile • Disable options, then open them one by onehttp://www.sophos.com/security/best-practice/facebook.html
    • The First Line of Defense Stay alert—you will be the first to know if something goes wrong – Are you receiving odd communications from someone? – Is your computer sounding strange or slower than normal?
    • Practice Digital Self Defense • Infosec Communicator blog • @benwoelk • @RIT_Infosec 20